Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
b3b2fc3762a88b5dfec193fda1234f2a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b3b2fc3762a88b5dfec193fda1234f2a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b3b2fc3762a88b5dfec193fda1234f2a_JaffaCakes118.html
-
Size
141KB
-
MD5
b3b2fc3762a88b5dfec193fda1234f2a
-
SHA1
a1b59100bcf51dd38ba90fb0ffa9989c5b7cfcf1
-
SHA256
83554fb26d8519db9b301dd15e43c25a4d3c63ec3c02ba59c88d663bea785c1b
-
SHA512
c83b1cb140e2bd56bfe54edda62587873703ba17660b9d76d8faa9e4b892eb5fbf935adce0fad519d0e17f8b67ad205e066c35e84609ccb1bc63ce26572079a6
-
SSDEEP
1536:Sshhtv+C5WDx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:Sa+w2x7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 4728 msedge.exe 4728 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2180 4728 msedge.exe 82 PID 4728 wrote to memory of 2180 4728 msedge.exe 82 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 4132 4728 msedge.exe 83 PID 4728 wrote to memory of 3728 4728 msedge.exe 84 PID 4728 wrote to memory of 3728 4728 msedge.exe 84 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85 PID 4728 wrote to memory of 4612 4728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b3b2fc3762a88b5dfec193fda1234f2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f18946f8,0x7ff9f1894708,0x7ff9f18947182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5923731597686406787,14050140035989376771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD58a8dc8efe20d9fedbc55cb3390cc127a
SHA1ad33f0f208c8eeb3ee88ccd3583625abff03b50c
SHA25634e0976ced2f22c10911f5c456ad257c917fba266b70a8ecd0e470ff53fc9b2b
SHA5126d5a78b536c1419b7c5f8990fa03486bc5c1379204466510fab6ef3eb11fea9a908e63afb7ac4b0c9676811d96d1ac307c5957d95f821786f30c19c8664b09dd
-
Filesize
6KB
MD5575168b566483399360ee9add1cd520a
SHA110a6ace1c2c5ea0efa49675a7914f05689d02fae
SHA256a0397bd9a098d8e20eaa157ce3b4bc980655e3673bd332b59b03ce3e7ba8ec2d
SHA512991044e8f88004bc07aac8bd27b888b3a11cc83ad37537cfe83922d84d92049a0a1f89736099f3b91ed72e1a38ed3752083d1fa850daee27d72769edbabe22f9
-
Filesize
11KB
MD525398e9a22e2cf2c1a0609eab72854e9
SHA1e6c2b4b0445c0a168dc2e8780edc0e1eb4b6be59
SHA25609747da6b632dc0637fca5ea155b32161fdbef7db7dad3b965148afb199b880b
SHA512d1764b7cb49028904a2c44875c91b9aa6387242ee539458816d47eabdcdcd834c0a6881f6689715e8ca220fca36ce4c308f49e07f8df5770dd96d31e40f7f208